September 19, 2021 at 11:29:57 AM UTC
VERIFY
Anomaly
Websites
Websites
Runtime: 1m
Share on Facebook or Twitter
On September 19, 2021 at 11:29:57 AM UTC, https://theintercept.com/ presented signs of DNS tampering on AS4134 in China. This might mean that https://theintercept.com/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null

DNS Queries

Resolver:
203.75.51.2
Query:
IN A theintercept.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
128.242.240.59
AS2914 (NTT America, Inc.)
Query:
IN AAAA theintercept.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001::430f:81d2
AS6939 (Hurricane Electric LLC)

TCP Connections

2001::430f:81d2:443: failed (generic_timeout_error)
128.242.240.59:443: failed (generic_timeout_error)

HTTP Requests

No data

Resolver

Resolver ASN
AS3462
Resolver IP
203.75.51.2
Resolver Network Name
Chunghwa Telecom Co., Ltd.
Measurement UID
20210919113058.269503_CN_webconnectivity_20264e8166c71119
Report ID
20210919T100606Z_webconnectivity_CN_4134_n1_JXjff7dBG6IkodwJ
Platform
linux
Software Name
ooniprobe-cli (3.11.0-alpha)
Measurement Engine
ooniprobe-engine (3.11.0-alpha)

Raw Measurement Data

Loading…